US20090094689A1 - Authentication method and system - Google Patents

Authentication method and system Download PDF

Info

Publication number
US20090094689A1
US20090094689A1 US12/245,971 US24597108A US2009094689A1 US 20090094689 A1 US20090094689 A1 US 20090094689A1 US 24597108 A US24597108 A US 24597108A US 2009094689 A1 US2009094689 A1 US 2009094689A1
Authority
US
United States
Prior art keywords
codebook
extraction pattern
authentication
symbols
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/245,971
Other versions
US9275214B2 (en
Inventor
Gianluca Gargaro
Patrizio Trinchini
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GARGARO, GIANLUCA, TRINCHINI, PATRIZIO
Publication of US20090094689A1 publication Critical patent/US20090094689A1/en
Application granted granted Critical
Publication of US9275214B2 publication Critical patent/US9275214B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Definitions

  • the present invention relates to an authentication method and system, and more particularly to a two factor authentication system based on the generation of a low cost code book.
  • the number of interactions that an individual may carry out via an electronic interface is continually increasing.
  • Automatic Teller Machines are now ubiquitous, and with the spread of the Internet, services such as online commerce, Internet banking, credit card and other bill payments, personalized websites including webmail sites, and even tax declaration are increasingly common.
  • services such as online commerce, Internet banking, credit card and other bill payments, personalized websites including webmail sites, and even tax declaration are increasingly common.
  • the usual means for carrying out this authentication is by submitting a PIN code, password or other piece of secret data, which is known by the service and the user alone.
  • each such piece of information should be unique to the service in question, and that it should be as large and random as possible, to minimize the risk of the discovery of one secret prejudicing the security of multiple systems, and the probability of a third-party guessing the secret.
  • each piece of secret information should be replaced frequently to maintain high security standards. It is also highly undesirable that a user should write down or otherwise record such secrets in an unprotected manner.
  • a tension thus arises between the need for a user to remember a large number of large pieces of random data, and the propensity of most individuals to choose the simplest option, such as choosing a well known and easy to remember set of passwords and using them in a cyclic way for all their services. This behaviour enormously reduces the security of protected resources.
  • a codebook comprising a number of groups of symbols in a predetermined pattern, is issued to a user.
  • the user is attributed or selects an extraction pattern representing an order of progression through the symbols in each group of symbols.
  • an authentication party which also has knowledge of the content of the codebook and the extraction pattern challenges the user to submit the symbols found at selected positions in the extraction pattern.
  • the user applies the extraction pattern to the codebook and retrieves the symbols found at the selected positions, and submits these to the authenticating party.
  • the authenticating party applies the same extraction pattern to the same codebook, and determines whether the results match those submitted by the user, and in a case where the two sets of symbols match, authenticates the user.
  • the method of the present invention may also be employed using an authenticating computer system and a codebook.
  • the computer system can receive requests for authentication across a network, poll the requesting parties for data strings based upon extraction of information from requested reference sequences and extraction patterns from the codebook, and, if a comparison of the information received from the requesting party matches the expected result, the requesting party may be authenticated to access a program on the authenticating computer system or to access another computer across the network.
  • FIG. 1 is a flow diagram view of a first embodiment of the present invention
  • FIG. 2 is a flow diagram view of a second embodiment of the present invention.
  • FIG. 3 is a flow diagram view of a third embodiment of the present invention.
  • FIG. 4 is a view of an exemplary configuration of a reference sequence
  • FIG. 5 is an illustration of a codebook on a physical support according to an embodiment
  • FIG. 6 displays the application of the extraction of the present invention to a physical support of FIG. 5 ;
  • FIG. 7 illustrates an exemplary extraction pattern of the present invention
  • FIG. 8 further illustrates use of an extraction pattern with the present invention
  • FIG. 9 shows the physical support of FIG. 6 , with the symbols in the positions not requested obscured for the sake of clarity;
  • FIG. 10 is a screenshot of an interface for the activation step of the present invention.
  • FIG. 11 is a block diagram of a computer system suitable for implementing the present invention.
  • a user seeking authentication to access a secure network or other electronic service initiates authentication by using a device, such as a mobile telephone, PDA, personal computer, automated teller machine terminal, to poll an authenticating party. This may be done by the use of a conventional login, by entering a user name, or otherwise providing user information to the network in a convention low-security manner.
  • the user receives notification from the authenticating party identifying an extraction pattern position for a selected reference sequence from a codebook comprising a first predetermined number of different reference sequences, each of said reference sequences comprising a second predetermined number of symbols and a unique identifier 106 .
  • the user references the code book to apply the extraction pattern to specific positions in sequence to extract a second predetermined number of symbols to said selected reference sequence so as to extract requested symbols at the extraction pattern position identified by said identifier 107 .
  • the user then returns the extracted symbol or symbols are to the authenticating party 108 .
  • the extracted request symbol or symbols are returned so that the authenticating party may apply the extraction pattern to each respective selected reference sequence to a matching local copy of the codebook so as to extract one or more authentication symbols 1081 , and the authentication symbols received by the authenticating party from the user are then compared to the corresponding request symbols 1082 . If, in each respective authentication symbol matches the corresponding request symbol 1083 , the authenticating party authenticates the user 1084 .
  • FIG. 2 a flow chart for an alternative embodiment of the invention is shown and will be described. More particularly, in addition to steps 106 to 108 as described in FIG. 1 and again incorporated within this embodiment, FIG. 2 further illustrates a prior step of defining a codebook 201 , and further defining extraction patterns 202 by referencing the codebook. Unlike other secure methods that require a time chip, a USB key or another electronic device, a codebook may consist of printed matter, such as a reference card. The codebook and the extraction pattern are provided to both an authenticating party and a requesting party 203 .
  • the extraction pattern and the codebook may be defined at the user device, or at the authenticating party, or by collaboration between these two parties, or either or both may still further be provided by one or more third parties. Both the authenticating party and the user device must share knowledge of the extraction pattern and the codebook.
  • the codebook may be randomly or pseudorandomly generated.
  • the extraction pattern may be selected by the user for example from a standard set of possible patterns.
  • the extraction pattern may alternatively be any arbitrary pattern as selected by the authenticating party or the user or randomly or pseudorandomly determined.
  • An underlying assumption of the present authenticating method is that the codebook and the extraction pattern are known only to the two parties, and to no other party. Knowledge of either the codebook or the extraction pattern alone by a third party does not prejudice the security of the method however.
  • the data may be sent as an encrypted electronic signal, or may be sent by some alternative parallel channel such as by conventional mail, facsimile message, telephone message, or other communication methods known in the art.
  • FIG. 3 a flow chart for a second alternative embodiment of the invention is shown and will be described.
  • This embodiment incorporates the steps of the prior two embodiments described above, but includes additional intermediate steps. Namely, after the codebook 201 and extraction pattern 202 are defined and the codebook is provided to the authenticating and requesting parties 203 , the method of FIG. 3 comprises the further steps of the authenticating party selecting at least one of the plurality of reference sequences 304 , and then notifying the unique identifier thereof to the requesting party 305 . Thus from a codebook containing a plurality of reference sequences, a subset of the available reference sequences may be selected for any given authentication.
  • the selected reference sequences may be chosen in a manner which is random, pseudorandom or otherwise unpredictable to external parties.
  • the reference sequences for use in authentication may be preselected by the user or the authenticating party either for a particular authentication situation, or for all authentications.
  • the reference sequences may be redefined as necessary.
  • the method of the present invention consists of the steps of defining a codebook 201 comprising a first predetermined number of different reference sequences, each of said reference sequences comprising a second predetermined number of symbols and a unique identifier.
  • An extraction pattern 202 is identified, and the codebook is providing the codebook to a requesting party 203 . It is noted that the extraction pattern may be identified by the authenticating party, selected by the requesting party or otherwise created by collaboration between the authenticating party and the requesting party.
  • the codebook may be provided 203 in physical or electronic form, and, if provided in electronic form, may be printed by the requesting party or stored in a memory for later retrieval and on-screen viewing on a computer, PDA, cell phone, or another electronic device including a screen as known in the art.
  • the authenticating party waits to receive a request from a requesting party for authentication to start the authentication sequence.
  • the authenticating party responds to the authentication request by specifying at least one selected reference sequence 304 and notifying the requesting party of the unique identifier of the reference sequence 305 .
  • the reference sequence may be preselected prior to receiving a request from the requesting party and queued awaiting a request, or selected when a request is received.
  • the requesting party receives the information identifying the reference sequence, and then acts upon the received information of the reference sequence 106 and unique identifier by applying the extraction pattern 107 , and returning the code extracted 108 .
  • This reception and return of information can be done across a network using any network device, such as a computer, a telephone, a PDA or other electronic communications device, or the present invention could also be employed on a single computer.
  • the authenticating party then compares the sequence of data returned from said requesting party based on the extracted symbols determined from said reference sequence using the extraction pattern position with an expected sequence based upon the previously determined reference sequence in the codebook 1082 , then, if the comparison of returned data matches the expected sequence 1083 , authenticates the requesting party 1084 .
  • the authenticating party may be a remote authenticator, allowing the requesting party to access another site or program on the network, or may reside on the same computer as the program to which the requesting party seeks authentication.
  • the codebook is embodied as physical printed matter.
  • This physical support may be, for example, a piece of sheet material, such as paper, card, plastic or similar material, upon which are printed the first plurality of reference sequences, each comprising the second plurality of symbols and a respective unique identifier.
  • the unique identifier need not be explicitly provided, but may be implicitly provided in the form of the position of the reference sequence on the physical support, e.g. by means of the identifier “top left” and so on.
  • One obvious special case is the situation where only one reference sequence is provided, where the identifier is simply, “the only reference sequence provided”.
  • the reference sequence comprises a rectangle 401 containing nine identical smaller rectangles in a 3 by 3 matrix.
  • the central one of these nine smaller rectangles 402 contains a symbol service as a unique identifier for the reference sequence in question.
  • the unique identifier is a number 1 .
  • the remaining eight smaller rectangles 4011 , 4012 , 4013 , 4014 , 4015 , 4016 , 4017 and 4018 are arranged around the central rectangle 402 .
  • Each of these peripheral rectangles contains an authentication symbol, which as shown consist in each case of a pair of alphanumeric characters.
  • any symbol or user identifiable characteristic may be used as an authentication symbol, for example, characters of any alphabet, pictograms or images, colours, patterns and so on.
  • the limiting considerations are simply that the user must be able to distinguish one from another, and submit the same to the authenticating party. In some cases this may call for the use of an existing interface wherein alphanumeric or even purely numeric input is necessary.
  • FIG. 5 shows a codebook on a physical support according to an embodiment.
  • a physical support 500 bearing eight reference sequences 501 , 502 , 503 , 504 , 505 , 506 , 507 and 508 , having the unique identifiers 1 , 2 , 3 , 4 , 5 , 6 and 7 respectively.
  • These eight reference sequences are each laid out is the same manner as that described with respect to FIG. 4 . It will be noted that the authentication symbols provided in each reference sequence are different from one sequence to the next, and that there is no discernable pattern in the authentication symbols.
  • FIG. 6 shows the application of the third embodiment to the physical support of FIG. 5 .
  • one or more reference sequences are selected from the available plurality, and the selected reference sequences are notified to the user by means of the unique identifier of each selected reference sequence.
  • the first, third, fourth and seventh reference sequences were selected for a particular authentication operation.
  • the authenticating party notifies the user with the unique identifiers “ 1 ”, “ 3 ”, “ 4 ” and “ 7 ”, on the basis of the physical support shown in FIG. 5 .
  • the user may then disregard the reference symbols 502 , 505 , 506 and 508 . Accordingly, as shown in FIG.
  • reference sequences 501 , 503 , 504 and 507 are retained. In some embodiments, this obscuring of the reference sequences not required for a particular authentication is only notional. In other embodiments, some or all reference sequences may be obscured by, for example, a foil or other removable layer, with only the sequences requested by the authenticating party being laid bare.
  • FIG. 7 shows a reference sequence as a 3 by 3 matrix, although the authentication symbols are omitted for the same of clarity.
  • An arrow 700 indicating a path through the eight peripheral smaller rectangles describes a spiraling path starting at the top left outer rectangle and proceeding clockwise about the center. This spiral represents the sequence in which one would count through the various symbols in order to arrive at a particular selected extraction pattern position. For example, if the third extraction pattern position was requested, the symbol retrieved would be that located in the top right hand rectangle. If the eighth extraction pattern position was requested, the symbol retrieved would be that located in the left hand column on the second row, and so on.
  • FIG. 8 shows the extension of the extraction pattern previously described extended to larger numbers.
  • the extraction pattern position number may be greater than the number of symbols present. In such cases, the extraction pattern may be applied in a repetitive manner until the position number is attained.
  • extraction pattern positions 1 to 8 are arrived at by a simple application of the extraction pattern to the matrix, as shown in the leftmost matrix 801 .
  • the pattern simply starts again at the first position, and so on as shown in the central matrix 802 , similar to a modulo operation.
  • the present invention implements a two-factor authentication mechanism, because it is based on something the user owns, namely the codebook, and something the user knows (the extraction pattern to decode authentication questions using the card).
  • the extraction pattern to decode authentication questions using the card.
  • One skilled in the art will appreciate that a very wide range of extraction patterns may be envisioned. Even in the case of the simple matrix described in the forgoing embodiments a very large number of permutations are possible, including spirals or circles in either direction, zig-zags along horizontal or vertical lines, letters of the alphabet or other characters and myriads of other patterns.
  • Different extraction patterns may be applied for different reference sequences. The number of positions defined in an extraction pattern before it starts repeating itself may not be equal to the number of positions in the reference sequence, so that each iteration starts from a different point.
  • a different series of steps may be described for subsequent iterations. For example, while for positions 1 to 8 a clockwise circulation though the various positions is described, for positions 9 to 17 a reverse in direction may be called for as shown in element 803 . Again, any number of variations may conceived.
  • the number of positions prior to a change in pattern need not be an integral multiple of the number of positions.
  • the pattern may be entirely arbitrary, although, for ease of the use, it is preferable that the pattern should correspond to some easily memorable pattern such as a sequence of spirals or circles in either direction, zig-zags along horizontal or vertical lines, letters of the alphabet or other characters.
  • FIG. 9 shows the physical support of FIG. 6 , with the symbols in the positions not requested obscured for the sake of clarity.
  • FIG. 9 shows the physical support of FIG. 6 , with the symbols in the positions not requested obscured for the sake of clarity.
  • Positions 1 , 2 , 7 and 5 are derived from the secret key the user knows and that has been communicated to the authentication service at the time of card activation.
  • User applies his key code according to a known (to the user and to the authentication system) mapping strategy. The key code is applied always in the same way, regardless of the reference sequences asked by the authentication system. For instance, if the key code is exactly 1275 and the mapping strategy is the clockwise spiral represented in FIG.
  • the authenticating party may optionally be a central authentication service which provides authentication for a number of different services.
  • the central authentication may define and distribute codebooks, and issue notifications. All communications may pass through service providers making use of this centralised authentication system.
  • Such a centralized authentication service may act as a hub of user profile data; this allows service providers to just define which information is relevant for them, and it can be extracted from existing profiles, thereby minimizing data entry from the end user of multiple services.
  • Service providers may also agree with the authenticating party about quality and strength of authentication (SLA), such as the minimum length of authentication answers, size and lifetime of codebooks, entropy of authentication answers, and other security parameters.
  • SLA quality and strength of authentication
  • Centralization of user profile data is also valuable for end users since they can immediately know the services to which they are subscribed, and may easily update profile information to all subscribed services or revoke or suspend one or all user subscriptions with just one click.
  • the authenticating party may generate authentication questions with a limited lifetime, which are equivalent to one time passwords. In such cases if the delay between step 1 - 6 and step 1081 exceeds a predetermined delay, authentication may be automatically refused, and the process may optionally return to step 106 , with new reference sequences and extraction pattern positions being requested.
  • a user seeks access to a particular service provider, which may optionally forward the user to the authenticating party.
  • the user is then able to register with the authenticating party providing basic profile information, and choosing a username and a temporary password.
  • the authenticating party generates a codebook according to the SLA with the service provider and binds it to the service of the provider as requested by the user.
  • a codebook is delivered to the user, using a method known in the art such as sending a download link to the user e-mail address for downloading and printing, or delivering a codebook via a physical courier.
  • a conventional computer graphical user interface window such as a web browser 1000 , comprising a text box 1001 for the entry of the selected reference sequences, a button or similar interface feature 1002 to initiate the automatic selection of reference sequences and a set of “radio buttons” or the like associated with a set of predefined extraction patterns from which a user may select.
  • Changing the extraction pattern is the easiest way to modify the authentication answer to a same authentication question; a user will always remember the same reference sequences and will just apply a different mapping strategy of the code on his/her card, thereby reading the card in a different manner.
  • An authenticating party can use the same authentication mechanism offered to service providers; after a user activates a codebook, he can choose to use it also to logon to the authenticating party; no additional password is required: the user will just remember the reference sequences and own the appropriate extraction pattern.
  • FIG. 11 depicts a computer system suitable for implementing the present invention.
  • Computer system 1100 may correspond to the user device described above and comprises a processor 1110 , a main memory 1120 , a mass storage interface 1130 , a display interface 1140 , and a network interface 1150 . These system components are interconnected through the use of a system bus 1101 .
  • Mass storage interface 1130 is used to connect mass storage devices (Hard disk drive 1155 ) to computer system 1100 .
  • One specific type of removable storage interface drive 1162 is a floppy disk drive which may store data to and read data from a floppy disk 1195 , but other types of computer readable storage medium may be employed, such as readable and optionally writable CD-ROM drive.
  • Main memory 1120 in accordance with the preferred embodiments contains data 1122 , an operating system 1124 .
  • Computer system 1100 utilizes well known virtual addressing mechanisms that allow the programs of computer system 1100 to behave as if they only have access to a large, single storage entity instead of access to multiple, smaller storage entities such as main memory 1120 and HDD 1155 .
  • main memory 1120 main memory 1120
  • data 1122 represents any data that serves as input to or output from any program in computer system 1100 .
  • Operating system 1124 is a multitasking computer operating system; those skilled in the art will appreciate that the spirit and scope of the present invention is not limited to any one operating system.
  • Processor 1110 may be constructed from one or more microprocessors and/or integrated circuits. Processor 1110 executes program instructions stored in main memory 1120 .
  • Main memory 1120 stores programs and data that processor 1110 may access.
  • processor 1110 When computer system 1100 starts up, processor 1110 initially executes the program instructions that make up operating system 1124 .
  • Operating system 1124 is a sophisticated program that manages the resources of computer system 1100 . Some of these resources are processor 1110 , main memory 1120 , mass storage interface 1130 , display interface 1140 , network interface 1150 , and system bus 1101 .
  • computer system 1100 is shown to contain only a single processor and a single system bus, those skilled in the art will appreciate that the present invention may be practiced using a computer system that has multiple processors and/or multiple buses.
  • Display interface 1140 is used to directly connect one or more displays 1160 to computer system 1100 .
  • These displays 1160 which may be non-intelligent (i.e., dumb) terminals or fully programmable workstations, are used to allow system administrators and users to communicate with computer system 1100 .
  • Network interface 1150 is used to connect other computer systems and/or workstations (e.g., 1175 in FIG. 11 ) to computer system 1100 across a network 1170 .
  • the present invention applies equally no matter how computer system 1100 may be connected to other computer systems and/or workstations, regardless of whether the network connection 1170 is made using present-day analogue and/or digital techniques or via some networking mechanism of the future.
  • many different network protocols can be used to implement a network. These protocols are specialized computer programs that allow computers to communicate across network 1170 .
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • the network 1170 connects the system 1100 to two further devices 1171 and 1172 , which may be other computer systems similar to that described above, or other network capable devices such as printers, routers etc.
  • network device 1172 is a local server, which is connected via a modem 1181 to a public network 1180 such as the World Wide Web.
  • a connection to a remote device or system 1185 may be established.
  • the role of the authenticating party as described above may be implemented by a local network computer 1170 , a local server 1172 or a remote system or device 1185 , depending on the implementation of the invention selected.
  • the invention in the form of software running on conventional hardware as described above with regard to FIG. 11 , or an embodiment containing both hardware and software elements.
  • the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode and other forms of implementation known in the art.
  • the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
  • a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
  • Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk.
  • Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
  • a data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus.
  • the memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • I/O devices including but not limited to keyboards, displays, pointing devices, etc.
  • I/O controllers can be coupled to the system either directly or through intervening I/O controllers.
  • Network adapters may also be coupled to the system to enable the data processing system to communicate with other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.

Abstract

A codebook, comprising a number of groups of symbols in a predetermined pattern printed on a card or the like is issued to a user. The user is attributed or selects an extraction pattern representing an order of progression through the symbols in each group of symbols. When the user wishes to make an authentication action an authentication party challenges the user to submit the symbols found at selected positions in the extraction pattern. The user applies the extraction pattern to the codebook and retrieves the symbols found at the selected positions, and submits these to the authenticating party. The authenticating party applies the same extraction pattern to the same codebook, and determines whether the results match those submitted by the user, and in a case where the two sets of symbols match, authenticates the user.

Description

    BACKGROUND OF THE INVENTION
  • The present invention relates to an authentication method and system, and more particularly to a two factor authentication system based on the generation of a low cost code book. The number of interactions that an individual may carry out via an electronic interface is continually increasing. Automatic Teller Machines are now ubiquitous, and with the spread of the Internet, services such as online commerce, Internet banking, credit card and other bill payments, personalized websites including webmail sites, and even tax declaration are increasingly common. In virtually all cases it is necessary for a user to identify himself to the system at some stage, and furthermore to authenticate this identity. The usual means for carrying out this authentication is by submitting a PIN code, password or other piece of secret data, which is known by the service and the user alone. With the multiplication of such services, an individual is required to maintain and remember an increasingly large number of such pieces of secret information. Furthermore, as a general rule it is desirable that each such piece of information should be unique to the service in question, and that it should be as large and random as possible, to minimize the risk of the discovery of one secret prejudicing the security of multiple systems, and the probability of a third-party guessing the secret. Ideally each piece of secret information should be replaced frequently to maintain high security standards. It is also highly undesirable that a user should write down or otherwise record such secrets in an unprotected manner. A tension thus arises between the need for a user to remember a large number of large pieces of random data, and the propensity of most individuals to choose the simplest option, such as choosing a well known and easy to remember set of passwords and using them in a cyclic way for all their services. This behaviour enormously reduces the security of protected resources.
  • SUMMARY OF THE INVENTION
  • According to the present invention, a codebook, comprising a number of groups of symbols in a predetermined pattern, is issued to a user. The user is attributed or selects an extraction pattern representing an order of progression through the symbols in each group of symbols. When the user wishes to make an authentication action an authentication party which also has knowledge of the content of the codebook and the extraction pattern challenges the user to submit the symbols found at selected positions in the extraction pattern. The user applies the extraction pattern to the codebook and retrieves the symbols found at the selected positions, and submits these to the authenticating party. The authenticating party applies the same extraction pattern to the same codebook, and determines whether the results match those submitted by the user, and in a case where the two sets of symbols match, authenticates the user.
  • The method of the present invention may also be employed using an authenticating computer system and a codebook. The computer system can receive requests for authentication across a network, poll the requesting parties for data strings based upon extraction of information from requested reference sequences and extraction patterns from the codebook, and, if a comparison of the information received from the requesting party matches the expected result, the requesting party may be authenticated to access a program on the authenticating computer system or to access another computer across the network.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a flow diagram view of a first embodiment of the present invention;
  • FIG. 2 is a flow diagram view of a second embodiment of the present invention;
  • FIG. 3 is a flow diagram view of a third embodiment of the present invention;
  • FIG. 4 is a view of an exemplary configuration of a reference sequence;
  • FIG. 5 is an illustration of a codebook on a physical support according to an embodiment;
  • FIG. 6 displays the application of the extraction of the present invention to a physical support of FIG. 5;
  • FIG. 7 illustrates an exemplary extraction pattern of the present invention;
  • FIG. 8 further illustrates use of an extraction pattern with the present invention;
  • FIG. 9 shows the physical support of FIG. 6, with the symbols in the positions not requested obscured for the sake of clarity;
  • FIG. 10 is a screenshot of an interface for the activation step of the present invention; and
  • FIG. 11 is a block diagram of a computer system suitable for implementing the present invention.
  • DETAILED DESCRIPTION
  • Referring now to FIG. 1, a flow chart of a first embodiment of the invention is shown and will be described. A user seeking authentication to access a secure network or other electronic service initiates authentication by using a device, such as a mobile telephone, PDA, personal computer, automated teller machine terminal, to poll an authenticating party. This may be done by the use of a conventional login, by entering a user name, or otherwise providing user information to the network in a convention low-security manner. The user then receives notification from the authenticating party identifying an extraction pattern position for a selected reference sequence from a codebook comprising a first predetermined number of different reference sequences, each of said reference sequences comprising a second predetermined number of symbols and a unique identifier 106. Next, in response to said notification, the user references the code book to apply the extraction pattern to specific positions in sequence to extract a second predetermined number of symbols to said selected reference sequence so as to extract requested symbols at the extraction pattern position identified by said identifier 107. The user then returns the extracted symbol or symbols are to the authenticating party 108. The extracted request symbol or symbols are returned so that the authenticating party may apply the extraction pattern to each respective selected reference sequence to a matching local copy of the codebook so as to extract one or more authentication symbols 1081, and the authentication symbols received by the authenticating party from the user are then compared to the corresponding request symbols 1082. If, in each respective authentication symbol matches the corresponding request symbol 1083, the authenticating party authenticates the user 1084.
  • Referring now to FIG. 2, a flow chart for an alternative embodiment of the invention is shown and will be described. More particularly, in addition to steps 106 to 108 as described in FIG. 1 and again incorporated within this embodiment, FIG. 2 further illustrates a prior step of defining a codebook 201, and further defining extraction patterns 202 by referencing the codebook. Unlike other secure methods that require a time chip, a USB key or another electronic device, a codebook may consist of printed matter, such as a reference card. The codebook and the extraction pattern are provided to both an authenticating party and a requesting party 203. The extraction pattern and the codebook may be defined at the user device, or at the authenticating party, or by collaboration between these two parties, or either or both may still further be provided by one or more third parties. Both the authenticating party and the user device must share knowledge of the extraction pattern and the codebook. The codebook may be randomly or pseudorandomly generated. The extraction pattern may be selected by the user for example from a standard set of possible patterns. The extraction pattern may alternatively be any arbitrary pattern as selected by the authenticating party or the user or randomly or pseudorandomly determined. An underlying assumption of the present authenticating method is that the codebook and the extraction pattern are known only to the two parties, and to no other party. Knowledge of either the codebook or the extraction pattern alone by a third party does not prejudice the security of the method however. It is therefore desirable to provide the codebook and the extraction pattern to the parties 203 via a secure method. The data may be sent as an encrypted electronic signal, or may be sent by some alternative parallel channel such as by conventional mail, facsimile message, telephone message, or other communication methods known in the art.
  • Referring now to FIG. 3, a flow chart for a second alternative embodiment of the invention is shown and will be described. This embodiment incorporates the steps of the prior two embodiments described above, but includes additional intermediate steps. Namely, after the codebook 201 and extraction pattern 202 are defined and the codebook is provided to the authenticating and requesting parties 203, the method of FIG. 3 comprises the further steps of the authenticating party selecting at least one of the plurality of reference sequences 304, and then notifying the unique identifier thereof to the requesting party 305. Thus from a codebook containing a plurality of reference sequences, a subset of the available reference sequences may be selected for any given authentication. The selected reference sequences may be chosen in a manner which is random, pseudorandom or otherwise unpredictable to external parties. The reference sequences for use in authentication may be preselected by the user or the authenticating party either for a particular authentication situation, or for all authentications. The reference sequences may be redefined as necessary. The steps of receiving notification 106, applying the extraction pattern 107, returning the extracted symbol 108 and verifying 1083, along with all other steps, as initially described in the discussion of FIG. 1, remain the same throughout all embodiments of the invention.
  • Reviewing FIG. 3 and the previous figures, the method of the present invention consists of the steps of defining a codebook 201 comprising a first predetermined number of different reference sequences, each of said reference sequences comprising a second predetermined number of symbols and a unique identifier. An extraction pattern 202 is identified, and the codebook is providing the codebook to a requesting party 203. It is noted that the extraction pattern may be identified by the authenticating party, selected by the requesting party or otherwise created by collaboration between the authenticating party and the requesting party. It is further noted that the codebook may be provided 203 in physical or electronic form, and, if provided in electronic form, may be printed by the requesting party or stored in a memory for later retrieval and on-screen viewing on a computer, PDA, cell phone, or another electronic device including a screen as known in the art. Next, the authenticating party waits to receive a request from a requesting party for authentication to start the authentication sequence. The authenticating party responds to the authentication request by specifying at least one selected reference sequence 304 and notifying the requesting party of the unique identifier of the reference sequence 305. It is noted that the reference sequence may be preselected prior to receiving a request from the requesting party and queued awaiting a request, or selected when a request is received. The requesting party receives the information identifying the reference sequence, and then acts upon the received information of the reference sequence 106 and unique identifier by applying the extraction pattern 107, and returning the code extracted 108. This reception and return of information can be done across a network using any network device, such as a computer, a telephone, a PDA or other electronic communications device, or the present invention could also be employed on a single computer. The authenticating party then compares the sequence of data returned from said requesting party based on the extracted symbols determined from said reference sequence using the extraction pattern position with an expected sequence based upon the previously determined reference sequence in the codebook 1082, then, if the comparison of returned data matches the expected sequence 1083, authenticates the requesting party 1084. The authenticating party may be a remote authenticator, allowing the requesting party to access another site or program on the network, or may reside on the same computer as the program to which the requesting party seeks authentication.
  • Turning now to FIG. 4, an exemplary configuration of a reference sequence is illustrated. In the current embodiment of the invention, the codebook is embodied as physical printed matter. This physical support may be, for example, a piece of sheet material, such as paper, card, plastic or similar material, upon which are printed the first plurality of reference sequences, each comprising the second plurality of symbols and a respective unique identifier. It will be understood that the unique identifier need not be explicitly provided, but may be implicitly provided in the form of the position of the reference sequence on the physical support, e.g. by means of the identifier “top left” and so on. One obvious special case is the situation where only one reference sequence is provided, where the identifier is simply, “the only reference sequence provided”. Other unique identifiers my take the form of the colour, shape or configuration of the reference sequence. As shown by the token illustrated, the reference sequence comprises a rectangle 401 containing nine identical smaller rectangles in a 3 by 3 matrix. The central one of these nine smaller rectangles 402 contains a symbol service as a unique identifier for the reference sequence in question. As shown here, the unique identifier is a number 1. The remaining eight smaller rectangles 4011, 4012, 4013, 4014, 4015, 4016, 4017 and 4018 are arranged around the central rectangle 402. Each of these peripheral rectangles contains an authentication symbol, which as shown consist in each case of a pair of alphanumeric characters. Naturally, any symbol or user identifiable characteristic may be used as an authentication symbol, for example, characters of any alphabet, pictograms or images, colours, patterns and so on. The limiting considerations are simply that the user must be able to distinguish one from another, and submit the same to the authenticating party. In some cases this may call for the use of an existing interface wherein alphanumeric or even purely numeric input is necessary.
  • FIG. 5 shows a codebook on a physical support according to an embodiment. As shown in FIG. 5 there is provided a physical support 500 bearing eight reference sequences 501, 502, 503, 504, 505, 506, 507 and 508, having the unique identifiers 1, 2, 3, 4, 5, 6 and 7 respectively. These eight reference sequences are each laid out is the same manner as that described with respect to FIG. 4. It will be noted that the authentication symbols provided in each reference sequence are different from one sequence to the next, and that there is no discernable pattern in the authentication symbols.
  • FIG. 6 shows the application of the third embodiment to the physical support of FIG. 5. In accordance with the third embodiment of the invention as described above, at step 305 one or more reference sequences are selected from the available plurality, and the selected reference sequences are notified to the user by means of the unique identifier of each selected reference sequence. In this example, the first, third, fourth and seventh reference sequences were selected for a particular authentication operation. Subsequently, the authenticating party notifies the user with the unique identifiers “1”, “3”, “4” and “7”, on the basis of the physical support shown in FIG. 5. The user may then disregard the reference symbols 502, 505, 506 and 508. Accordingly, as shown in FIG. 6, only the remaining reference sequences 501, 503, 504 and 507 are retained. In some embodiments, this obscuring of the reference sequences not required for a particular authentication is only notional. In other embodiments, some or all reference sequences may be obscured by, for example, a foil or other removable layer, with only the sequences requested by the authenticating party being laid bare.
  • Turning now to FIG. 7, an exemplary extraction pattern is shown. As described above, it is necessary to apply an extraction pattern to the selected reference sequence or sequences. FIG. 7 shows a reference sequence as a 3 by 3 matrix, although the authentication symbols are omitted for the same of clarity. An arrow 700 indicating a path through the eight peripheral smaller rectangles describes a spiraling path starting at the top left outer rectangle and proceeding clockwise about the center. This spiral represents the sequence in which one would count through the various symbols in order to arrive at a particular selected extraction pattern position. For example, if the third extraction pattern position was requested, the symbol retrieved would be that located in the top right hand rectangle. If the eighth extraction pattern position was requested, the symbol retrieved would be that located in the left hand column on the second row, and so on.
  • FIG. 8 shows the extension of the extraction pattern previously described extended to larger numbers. The extraction pattern position number may be greater than the number of symbols present. In such cases, the extraction pattern may be applied in a repetitive manner until the position number is attained. As previously described with respect to FIG. 7, extraction pattern positions 1 to 8 are arrived at by a simple application of the extraction pattern to the matrix, as shown in the leftmost matrix 801. When a ninth extraction pattern position is called for, the pattern simply starts again at the first position, and so on as shown in the central matrix 802, similar to a modulo operation.
  • As described, the present invention implements a two-factor authentication mechanism, because it is based on something the user owns, namely the codebook, and something the user knows (the extraction pattern to decode authentication questions using the card). One skilled in the art will appreciate that a very wide range of extraction patterns may be envisioned. Even in the case of the simple matrix described in the forgoing embodiments a very large number of permutations are possible, including spirals or circles in either direction, zig-zags along horizontal or vertical lines, letters of the alphabet or other characters and myriads of other patterns. Different extraction patterns may be applied for different reference sequences. The number of positions defined in an extraction pattern before it starts repeating itself may not be equal to the number of positions in the reference sequence, so that each iteration starts from a different point. Still further, rather than simply repeating the pattern as previously described for position numbers greater than positions given, a different series of steps may be described for subsequent iterations. For example, while for positions 1 to 8 a clockwise circulation though the various positions is described, for positions 9 to 17 a reverse in direction may be called for as shown in element 803. Again, any number of variations may conceived. The number of positions prior to a change in pattern need not be an integral multiple of the number of positions. The pattern may be entirely arbitrary, although, for ease of the use, it is preferable that the pattern should correspond to some easily memorable pattern such as a sequence of spirals or circles in either direction, zig-zags along horizontal or vertical lines, letters of the alphabet or other characters. With a simple reference sequence selection of 6 digits and a {8,8,2} codebook, that is, a codebook with 8 reference sequences, 8 authentication symbols per reference sequence and 2 characters per authentication symbol, it is possible to generate to 8̂6=262, 144 different authentication questions and provide as many answers composed by 6*2=12 symbols.
  • Turning now to FIG. 9, one can appreciate that by applying the given extraction pattern to selected reference sequences as described with respect to FIG. 6, it is possible to extract a series of authentication symbols. Continuing the prior examples, and using a clockwise extraction pattern starting at the upper left corner illustrated in FIG. 7, suppose that reference sequences 1, 3, 4 and 7 and the positions 1, 2, 7 and 5 have been requested. FIG. 9 shows the physical support of FIG. 6, with the symbols in the positions not requested obscured for the sake of clarity. Thus as shown by applying the sequence of FIG. 7 to the reference sequence numbered 1, and selecting the first position in the pattern, we select the symbol “SD” in the top left rectangle of the top left reference sequence. Next as shown by applying the sequence of FIG. 7 to the reference sequence numbered 4, and selecting the second position in the pattern, we select the symbol “JP” in the top centre rectangle of the third reference sequence in the top row. Next as shown by applying the sequence of FIG. 7 to the reference sequence numbered 4, and selecting the seventh position in the pattern, we select the symbol “V4” in the bottom left rectangle of the rightmost reference sequence in the top row. Finally as shown by applying the sequence of FIG. 7 to the reference sequence numbered 7, and selecting the fifth position in the pattern, we select the symbol “T3” in the bottom right rectangle of the third reference sequence in the top row. When thus applying the selection process at the user site, the extracted symbols “SD,JP,V4,T3” can then be transmitted to the authenticating party. By applying the same process at the authenticating party, the same symbols can be derived, and compared to those received for the user, and in a case where the two sets of symbols are found to match, the authenticating party can authenticate the user, as described above. Positions 1, 2, 7 and 5 are derived from the secret key the user knows and that has been communicated to the authentication service at the time of card activation. User applies his key code according to a known (to the user and to the authentication system) mapping strategy. The key code is applied always in the same way, regardless of the reference sequences asked by the authentication system. For instance, if the key code is exactly 1275 and the mapping strategy is the clockwise spiral represented in FIG. 7, when the system asks for reference sequences 2, 3, 5, 8 from the card represented in FIG. 5, the extracted symbols will be: L2-L5-D7-58; again, if the system asks for reference sequence 2, 4, 6, 7, the extracted symbols, using the same key code and mapping strategy, will be: L2-P1-12-T3.
  • In the present invention, the authenticating party may optionally be a central authentication service which provides authentication for a number of different services. The central authentication may define and distribute codebooks, and issue notifications. All communications may pass through service providers making use of this centralised authentication system. Such a centralized authentication service may act as a hub of user profile data; this allows service providers to just define which information is relevant for them, and it can be extracted from existing profiles, thereby minimizing data entry from the end user of multiple services. Service providers may also agree with the authenticating party about quality and strength of authentication (SLA), such as the minimum length of authentication answers, size and lifetime of codebooks, entropy of authentication answers, and other security parameters. Centralization of user profile data is also valuable for end users since they can immediately know the services to which they are subscribed, and may easily update profile information to all subscribed services or revoke or suspend one or all user subscriptions with just one click. The authenticating party may generate authentication questions with a limited lifetime, which are equivalent to one time passwords. In such cases if the delay between step 1-6 and step 1081 exceeds a predetermined delay, authentication may be automatically refused, and the process may optionally return to step 106, with new reference sequences and extraction pattern positions being requested.
  • Turning now to FIG. 10, an optional implementation of the present invention is illustrated and will be described. Initially, a user seeks access to a particular service provider, which may optionally forward the user to the authenticating party. The user is then able to register with the authenticating party providing basic profile information, and choosing a username and a temporary password. The authenticating party generates a codebook according to the SLA with the service provider and binds it to the service of the provider as requested by the user. A codebook is delivered to the user, using a method known in the art such as sending a download link to the user e-mail address for downloading and printing, or delivering a codebook via a physical courier. After receiving the codebook, the user must activate it, communicating to the authenticating party the preselected reference sequences and the extraction pattern he will use. The preselected reference sequences and/or the extraction pattern can be changed at any time during the codebook lifetime. For example, a conventional computer graphical user interface window such as a web browser 1000, comprising a text box 1001 for the entry of the selected reference sequences, a button or similar interface feature 1002 to initiate the automatic selection of reference sequences and a set of “radio buttons” or the like associated with a set of predefined extraction patterns from which a user may select. Changing the extraction pattern is the easiest way to modify the authentication answer to a same authentication question; a user will always remember the same reference sequences and will just apply a different mapping strategy of the code on his/her card, thereby reading the card in a different manner. An authenticating party can use the same authentication mechanism offered to service providers; after a user activates a codebook, he can choose to use it also to logon to the authenticating party; no additional password is required: the user will just remember the reference sequences and own the appropriate extraction pattern. Given the extremely low cost and ease of generation of the physical support for the codebook, users may own multiple codebooks, one for each type of services; generally, this is not possible with other two-factor authentication systems currently known in the art, because almost all of them rely on hardware devices, which are much more expensive than a physical support such as a printed card as previously described.
  • FIG. 11 depicts a computer system suitable for implementing the present invention. Computer system 1100 may correspond to the user device described above and comprises a processor 1110, a main memory 1120, a mass storage interface 1130, a display interface 1140, and a network interface 1150. These system components are interconnected through the use of a system bus 1101. Mass storage interface 1130 is used to connect mass storage devices (Hard disk drive 1155) to computer system 1100. One specific type of removable storage interface drive 1162 is a floppy disk drive which may store data to and read data from a floppy disk 1195, but other types of computer readable storage medium may be employed, such as readable and optionally writable CD-ROM drive. There is similarly provided a user input interface 1144 which received user interactions from interface devices such as a mouse 1165 and a keyboard 1164. There is still further provided a printer interface 1146 which may send and optionally receive signals to and from a printer 1166. Main memory 1120 in accordance with the preferred embodiments contains data 1122, an operating system 1124. Computer system 1100 utilizes well known virtual addressing mechanisms that allow the programs of computer system 1100 to behave as if they only have access to a large, single storage entity instead of access to multiple, smaller storage entities such as main memory 1120 and HDD 1155. Therefore, while data 1122, operating system 1124, are shown to reside in main memory 1120, those skilled in the art will recognize that these items are not necessarily all completely contained in main memory 1120 at the same time. It should also be noted that the term “memory” is used herein to generically refer to the entire virtual memory of computer system 1100. Data 1122 represents any data that serves as input to or output from any program in computer system 1100. Operating system 1124 is a multitasking computer operating system; those skilled in the art will appreciate that the spirit and scope of the present invention is not limited to any one operating system. Processor 1110 may be constructed from one or more microprocessors and/or integrated circuits. Processor 1110 executes program instructions stored in main memory 1120. Main memory 1120 stores programs and data that processor 1110 may access. When computer system 1100 starts up, processor 1110 initially executes the program instructions that make up operating system 1124. Operating system 1124 is a sophisticated program that manages the resources of computer system 1100. Some of these resources are processor 1110, main memory 1120, mass storage interface 1130, display interface 1140, network interface 1150, and system bus 1101. Although computer system 1100 is shown to contain only a single processor and a single system bus, those skilled in the art will appreciate that the present invention may be practiced using a computer system that has multiple processors and/or multiple buses. In addition, the interfaces that are used in the preferred embodiment each include separate, fully programmed microprocessors that are used to off-load compute-intensive processing from processor 1110. However, those skilled in the art will appreciate that the present invention applies equally to computer systems that simply use I/O adapters to perform similar functions. Display interface 1140 is used to directly connect one or more displays 1160 to computer system 1100. These displays 1160, which may be non-intelligent (i.e., dumb) terminals or fully programmable workstations, are used to allow system administrators and users to communicate with computer system 1100. Note, however, that while display interface 1140 is provided to support communication with one or more displays 1160, computer system 1100 does not necessarily require a display 1165, because all needed interaction with users and other processes may occur via network interface 1150. Network interface 1150 is used to connect other computer systems and/or workstations (e.g., 1175 in FIG. 11) to computer system 1100 across a network 1170. The present invention applies equally no matter how computer system 1100 may be connected to other computer systems and/or workstations, regardless of whether the network connection 1170 is made using present-day analogue and/or digital techniques or via some networking mechanism of the future. In addition, many different network protocols can be used to implement a network. These protocols are specialized computer programs that allow computers to communicate across network 1170. TCP/IP (Transmission Control Protocol/Internet Protocol) is an example of a suitable network protocol, for example over an Ethernet network. As shown, the network 1170 connects the system 1100 to two further devices 1171 and 1172, which may be other computer systems similar to that described above, or other network capable devices such as printers, routers etc. In the present example, network device 1172 is a local server, which is connected via a modem 1181 to a public network 1180 such as the World Wide Web. By means of this public network 1180 a connection to a remote device or system 1185 may be established. The role of the authenticating party as described above may be implemented by a local network computer 1170, a local server 1172 or a remote system or device 1185, depending on the implementation of the invention selected.
  • It is important to note that while the present invention has been and will continue to be described in the context of a fully functional computer system, those skilled in the art will appreciate that the present invention is capable of being distributed as a program product in a variety of forms, and that the present invention applies equally regardless of the particular type of signal bearing media used to actually carry out the distribution. Examples of suitable signal bearing media include: recordable type media such as floppy disks and CD ROM 1195, and transmission type media such as digital and analogue communications links. The invention can take the form of an entirely hardware embodiment, with recourse to suitably specified FPGAs, ASICs, CPLDs, dedicated integrated circuits and circuits formed of discrete components or any combination of all of these, an entirely software embodiment e.g. in the form of software running on conventional hardware as described above with regard to FIG. 11, or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode and other forms of implementation known in the art. Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD. A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution. Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers. Network adapters may also be coupled to the system to enable the data processing system to communicate with other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.

Claims (11)

1. A method of authentication comprising the steps of:
receiving a notification from an authenticating party of an identifier identifying an extraction pattern position for a selected reference sequence from a codebook comprising a first predetermined number of different reference sequences, each of said reference sequences comprising a second predetermined number of symbols and a unique identifier;
applying an extraction pattern specifying positions in a sequence comprising a second predetermined number of symbols to said selected reference sequence so as to extract a request symbols at the extraction pattern position identified by said identifier therefrom; and
returning the extracted request symbol to the authenticating party, for said authenticating party to apply said extraction pattern to said respective selected reference sequence so as to extract an authentication symbols therefrom, and comparing the authentication symbol to the corresponding request symbol returned from said requesting party, and in a case where said authentication symbol matches said request symbol, said authenticating party authenticating said requesting party.
2. The method of claim 1 further comprising:
defining said codebook;
assigning said extraction pattern; and
providing said codebook and said extraction pattern to an authenticating party and a requesting party.
3. The method of claim 1 further comprising:
selecting at least one of said reference sequences by said authenticating party; and
notifying said requesting party of the unique identifier of said selected reference sequence.
4. The method of claim 1 wherein said cookbook comprises physical media.
5. A method of authentication comprising the steps of:
defining a codebook comprising a first predetermined number of different reference sequences, each of said reference sequences comprising a second predetermined number of symbols and a unique identifier;
providing said codebook to a requesting party;
assigning an extraction pattern;
receiving a request from a requesting party for authentication;
specifying at least one selected reference sequence and a predetermined extraction pattern position from said codebook;
comparing a sequence of data returned from said requesting party based on the extracted symbols determined from said reference sequence and said predetermined extraction pattern position with an expected sequence based upon said codebook, said reference sequence, said extraction pattern and said predetermined pattern position;
authenticating said requesting party if said comparison of returned data matches said expected sequence.
6. The method of claim 5 wherein said codebook comprises physical media possessed by said requesting party.
7. The method of claim 5 wherein said codebook is stored in a memory.
8. The method of claim 5 wherein said extraction pattern assignment is based upon input received from said requesting party.
9. A system comprising:
an authenticating computer system comprising a processor, a memory and a network communication interface;
a codebook comprising a plurality of reference sequences;
a computer program stored in said memory to receive an authentication request from said network communication interface, said program responding to said request by specifying at least one selected reference sequence and at least one position corresponding to a predetermined extraction pattern of said selected reference sequence from said codebook, receiving a response based on said specified reference sequence, said extraction pattern and said predetermined pattern position from said codebook, comparing said response with an expected result, and conveying an authentication signal when said response matches said expected result.
10. The system of claim 9 wherein said authentication signal is conveyed across said network communication interface to a second computer.
11. The system of claim 9 wherein said authentication signal is conveyed to a sender of said authentication request and conveyed to a second computer program to authorize use of said second computer program.
US12/245,971 2007-10-04 2008-10-06 Authentication method and system Expired - Fee Related US9275214B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP07117917.0 2007-10-04
EP07117917 2007-10-04
EP07117917 2007-10-04

Publications (2)

Publication Number Publication Date
US20090094689A1 true US20090094689A1 (en) 2009-04-09
US9275214B2 US9275214B2 (en) 2016-03-01

Family

ID=40352193

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/245,971 Expired - Fee Related US9275214B2 (en) 2007-10-04 2008-10-06 Authentication method and system

Country Status (2)

Country Link
US (1) US9275214B2 (en)
WO (1) WO2009043661A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110277021A1 (en) * 2009-01-09 2011-11-10 Hideharu Ogawa Authentication system
US20130139248A1 (en) * 2011-11-28 2013-05-30 Samsung Electronics Co., Ltd. Method of authenticating password and portable device thereof
US20160359866A1 (en) * 2015-06-05 2016-12-08 Fisher-Rosemount Systems, Inc. Methods and apparatus to control communications of endpoints in an industrial enterprise system based on integrity
US20180365409A1 (en) * 2017-06-19 2018-12-20 Kyocera Document Solutions Inc. Service providing system, card set used in service providing system, and method for providing service
US11388596B2 (en) * 2019-09-03 2022-07-12 International Business Machines Corporation Secure transmittal of wireless local area network access codes

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10235532B2 (en) * 2016-09-23 2019-03-19 Harman International Industries, Incorporated Device access control
US11580210B2 (en) * 2021-02-18 2023-02-14 International Business Machines Corporation Password authentication

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559961A (en) * 1994-04-04 1996-09-24 Lucent Technologies Inc. Graphical password
US20020029341A1 (en) * 1999-02-11 2002-03-07 Ari Juels Robust visual passwords
WO2002073377A2 (en) * 2001-03-14 2002-09-19 Jaloveczki Laszlo Authorisation method for a user of a limited access system having an authorisation centre
US20040111646A1 (en) * 2002-12-10 2004-06-10 International Business Machines Corporation Password that associates screen position information with sequentially entered characters
US20040123151A1 (en) * 2002-12-23 2004-06-24 Authenture, Inc. Operation modes for user authentication system based on random partial pattern recognition
US20040243855A1 (en) * 2001-11-28 2004-12-02 Bouygues Telecom, A Corporation Of France Method for providing secure access to a digital resource
US6862687B1 (en) * 1997-10-23 2005-03-01 Casio Computer Co., Ltd. Checking device and recording medium for checking the identification of an operator
US20050060554A1 (en) * 2003-08-29 2005-03-17 Nokia Corporation Method and device for customized picture-based user identification and authentication
US6934860B1 (en) * 2000-05-08 2005-08-23 Xerox Corporation System, method and article of manufacture for knowledge-based password protection of computers and other systems
US20060031174A1 (en) * 2004-07-20 2006-02-09 Scribocel, Inc. Method of authentication and indentification for computerized and networked systems
US20070016941A1 (en) * 2005-07-08 2007-01-18 Gonzalez Carlos J Methods used in a mass storage device with automated credentials loading
US20070016804A1 (en) * 2005-07-13 2007-01-18 Kemshall Andrew C Password management system
US20070028299A1 (en) * 2005-07-26 2007-02-01 Gherardo Albano Client-based method, system and program to manage multiple authentication
US20080195976A1 (en) * 2007-02-14 2008-08-14 Cho Kyung-Suk Method of setting password and method of authenticating password in portable device having small number of operation buttons
US20080295165A1 (en) * 2004-03-31 2008-11-27 Merlinnovations & Consulting Gmbh Method for Safely Logging Onto a Technical System

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7644433B2 (en) * 2002-12-23 2010-01-05 Authernative, Inc. Authentication system and method based upon random partial pattern recognition
EP1934582A1 (en) 2005-10-03 2008-06-25 Koninklijke Philips Electronics N.V. Biosensors with improved sensitivity
GB2433147A (en) * 2005-12-01 2007-06-13 Jonathan Geoffrey Milt Craymer A method for verifying a person's identity or entitlement using one-time transaction codes

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559961A (en) * 1994-04-04 1996-09-24 Lucent Technologies Inc. Graphical password
US6862687B1 (en) * 1997-10-23 2005-03-01 Casio Computer Co., Ltd. Checking device and recording medium for checking the identification of an operator
US20020029341A1 (en) * 1999-02-11 2002-03-07 Ari Juels Robust visual passwords
US6934860B1 (en) * 2000-05-08 2005-08-23 Xerox Corporation System, method and article of manufacture for knowledge-based password protection of computers and other systems
WO2002073377A2 (en) * 2001-03-14 2002-09-19 Jaloveczki Laszlo Authorisation method for a user of a limited access system having an authorisation centre
US20040243855A1 (en) * 2001-11-28 2004-12-02 Bouygues Telecom, A Corporation Of France Method for providing secure access to a digital resource
US20040111646A1 (en) * 2002-12-10 2004-06-10 International Business Machines Corporation Password that associates screen position information with sequentially entered characters
US20040123151A1 (en) * 2002-12-23 2004-06-24 Authenture, Inc. Operation modes for user authentication system based on random partial pattern recognition
US20050060554A1 (en) * 2003-08-29 2005-03-17 Nokia Corporation Method and device for customized picture-based user identification and authentication
US20080295165A1 (en) * 2004-03-31 2008-11-27 Merlinnovations & Consulting Gmbh Method for Safely Logging Onto a Technical System
US20060031174A1 (en) * 2004-07-20 2006-02-09 Scribocel, Inc. Method of authentication and indentification for computerized and networked systems
US20070016941A1 (en) * 2005-07-08 2007-01-18 Gonzalez Carlos J Methods used in a mass storage device with automated credentials loading
US20070016804A1 (en) * 2005-07-13 2007-01-18 Kemshall Andrew C Password management system
US20070028299A1 (en) * 2005-07-26 2007-02-01 Gherardo Albano Client-based method, system and program to manage multiple authentication
US20080195976A1 (en) * 2007-02-14 2008-08-14 Cho Kyung-Suk Method of setting password and method of authenticating password in portable device having small number of operation buttons

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110277021A1 (en) * 2009-01-09 2011-11-10 Hideharu Ogawa Authentication system
US8959603B2 (en) * 2009-01-09 2015-02-17 Hideharu Ogawa Authentication system
US20130139248A1 (en) * 2011-11-28 2013-05-30 Samsung Electronics Co., Ltd. Method of authenticating password and portable device thereof
US9165132B2 (en) * 2011-11-28 2015-10-20 Samsung Electronics Co., Ltd. Method of authenticating password and portable device thereof
US20160359866A1 (en) * 2015-06-05 2016-12-08 Fisher-Rosemount Systems, Inc. Methods and apparatus to control communications of endpoints in an industrial enterprise system based on integrity
CN106249704A (en) * 2015-06-05 2016-12-21 费希尔-罗斯蒙特系统公司 For the method and apparatus controlling the communication of the end points in industrial undertaking's system based on integrity
US10051059B2 (en) * 2015-06-05 2018-08-14 Fisher-Rosemount Systems, Inc. Methods and apparatus to control communications of endpoints in an industrial enterprise system based on integrity
US20180365409A1 (en) * 2017-06-19 2018-12-20 Kyocera Document Solutions Inc. Service providing system, card set used in service providing system, and method for providing service
US11388596B2 (en) * 2019-09-03 2022-07-12 International Business Machines Corporation Secure transmittal of wireless local area network access codes

Also Published As

Publication number Publication date
WO2009043661A1 (en) 2009-04-09
US9275214B2 (en) 2016-03-01

Similar Documents

Publication Publication Date Title
US20210203655A1 (en) Single sign-on for unmanaged mobile devices
US10057251B2 (en) Provisioning account credentials via a trusted channel
US10009378B2 (en) Method and apparatus for providing authentication using policy-controlled authentication articles and techniques
US9680836B2 (en) Generation of a visually obfuscated representation of an alphanumeric message that indicates availability of a proposed identifier
US9524395B2 (en) Apparatus and methods for obtaining a password hint
Boyd Getting started with OAuth 2.0
US8966579B2 (en) Method and apparatus for providing authentication between a sending unit and a recipient based on challenge usage data
US10171448B2 (en) Single sign-on for unmanaged mobile devices
EP3443724B1 (en) Web service picture passwords
US8756652B2 (en) Automatic PIN creation using password
US20100043062A1 (en) Methods and Systems for Management of Image-Based Password Accounts
US9275214B2 (en) Authentication method and system
CN113711211A (en) First-factor contactless card authentication system and method
US20080052245A1 (en) Advanced multi-factor authentication methods
JP2011070699A (en) Generalized user identification and authentication system
US11689512B2 (en) Access key retrieval service for clients
US11223612B2 (en) End to end secure identification and verification of users for organizations on multitenant platform
US7347366B2 (en) Method and apparatus to provide authentication using an authentication card
US10866711B1 (en) Providing account information to applications
WO2008024362A9 (en) Advanced multi-factor authentication methods
JP2007065789A (en) Authentication system and method
KR20140087627A (en) Certification system using security key of icon combination and method of using the same

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GARGARO, GIANLUCA;TRINCHINI, PATRIZIO;REEL/FRAME:021646/0285

Effective date: 20081007

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Expired due to failure to pay maintenance fee

Effective date: 20200301